Call for Papers

Elections form the foundations of democracy and have been the target for attack since its inception. Over the last few decades the introduction of digital technologies to elections has opened up a raft of new attack vectors. Recently in the US there is discussion of placing voting technologies on the list of national, critical infrastructures. Secure voting protocols, in particular so-called “end-to-end verifiable” schemes, have been a hot topic of research for the last decade or so. Voting poses many challenges: the precise characterization of very subtle properties including verifiability and coercion resistance, and the design and analysis of schemes providing these properties in a complex, hostile environment. The field requires a deep understanding of modern crypto but is highly interdisciplinary, requiring understanding of the role of humans, procedures, laws, regulations, etc.

Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:

In-person voting systems

Remote/Internet voting systems

Voter registration and authentication systems

Procedures for ballot and election auditing

Cryptographic (or non-cryptographic) verifiable election schemes

Attacks on existing systems

Designs of new systems

Experiences deploying voting systems or conducting elections

Experiences detecting and recovering from election problems

Formal or informal security or requirements analysis

Examination of usability and accessibility issues

Research on relevant regulations, standards, or laws

Important Dates

Submissions deadline

23:59 UTC, December 9th, 2016

Notification of acceptance

February 1st, 2017

Submission

Submissions will be judged on originality, relevance, correctness, and clarity.

Submissions must not substantially overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the Springer Lecture Notes in Computer Science format and should be no more than 15 pages including references and well-marked appendices. Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who wish to publish a full version of their paper later may opt-out by publishing a 1-2 page extended abstract only.

All submissions will be reviewed double-blind, and as such, must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.